CN1558597A - Network based image quality identification method - Google Patents

Network based image quality identification method Download PDF

Info

Publication number
CN1558597A
CN1558597A CNA2004100152142A CN200410015214A CN1558597A CN 1558597 A CN1558597 A CN 1558597A CN A2004100152142 A CNA2004100152142 A CN A2004100152142A CN 200410015214 A CN200410015214 A CN 200410015214A CN 1558597 A CN1558597 A CN 1558597A
Authority
CN
China
Prior art keywords
image quality
network
authentication method
transmit leg
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2004100152142A
Other languages
Chinese (zh)
Other versions
CN100589391C (en
Inventor
严金波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SPECIAL CERTIFICATE R
International Security Technology Ltd IST
Shenzhen Huazhenglian Industrial Co Ltd
Original Assignee
CENTER FOR RESEARCHING AND MAKING SPECIAL CERTIFICATES IN SHENZHEN
International Security Technology Ltd IST
Shenzhen Huazhenglian Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTER FOR RESEARCHING AND MAKING SPECIAL CERTIFICATES IN SHENZHEN, International Security Technology Ltd IST, Shenzhen Huazhenglian Industrial Co Ltd filed Critical CENTER FOR RESEARCHING AND MAKING SPECIAL CERTIFICATES IN SHENZHEN
Priority to CN200410015214A priority Critical patent/CN100589391C/en
Publication of CN1558597A publication Critical patent/CN1558597A/en
Application granted granted Critical
Publication of CN100589391C publication Critical patent/CN100589391C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An image quality identification method based on network comprising the steps of, making digitalized image file, the image dispatcher uploading the prepared digitalized image files onto the identification websites through a first network, the identification website determining the qualification of the uploaded digitalized image data, if qualified, the digitalized image data is transmitted to the database of another network insulated from the first network and the received data relating to the qualified image data is transmitted to the image dispatcher through the network, if not qualified, then the unqualified information is transmitted to the image dispatcher.

Description

Based on network image quality authentication method
Technical field
The present invention relates to image processing technique, more particularly, relate to a kind of based on network image quality authentication method.
Background technology
The image quality authentication, especially the photo of the higher identity document of quality requirement, authentication separates with photographic quality because photo is made, therefore, can only adopt quality is authorized the making photo in the photo studio preferably, the unit that does not obtain to specify and authorize then can not carry out the identity document photo to be made, there are many drawbacks in this non market-oriented mode, simultaneously, and traditional mode of taking a picture in the appointment photo studio, need the client to go to the photo studio at least 2 times, also to run repeatedly as defective, obtain qualified photo after, also to deliver to local police station or relevant accreditation unit, accreditation unit also will be with photo scanning, with the operation of the synthetic grade of word segment.The second generation control of identity cards way of having put into effect, its portrait collection may be adopted the pattern of perfect marketization.Therefore, in Certification of Second Generation portrait gatherer process, the point of taking a picture can be a lot, and the photograph personnel may not pass through professional training.
Summary of the invention
The present invention is exactly for guaranteeing Certification of Second Generation making quality, make things convenient for the people, improve and accept and accreditation efficient, alleviate the working strength of local police station, digital photo collection will authenticate by photographic quality authentication center logarithmic code photo, and the transmission means of qualified digital photograph by safety transferred in the public security grid database, this will guarantee the safety of public security grid database to greatest extent, and improve the accreditation quality.
According to based on network image quality authentication method of the present invention, may further comprise the steps: a) make digitized image file; B) visual transmit leg uploads to authentication website by first network with the digitized image file of making; C) whether it meets the requirements authentication website to the digitized picture data judging uploaded; D) if pictorial data is qualified the transmission means of described digital map image data by safety transferred to the database of another network of first Network Isolation and by network send with the related number of the accepting data of qualified pictorial data to described visual transmit leg; E) if pictorial data is defective defective information is sent to visual transmit leg.
In above-mentioned image quality authentication method, after described step c), also comprise step (f): the photo that quality problems are not serious is simply adjusted.
In above-mentioned image quality authentication method, also comprise step (g): statistics is from the image quality situation of each described visual transmit leg.
In above-mentioned image quality authentication method, also comprise step (h), to counting the relatively poor described visual transmit leg of image quality, send the message that its transmission image was reminded or forbidden to quality.
In above-mentioned image quality authentication method, at b) before the step, further comprising the steps of: as b1) to make the computer of visual transmit leg connect the above first network; B2) undertaken about permitting it to transmit the application for registration of pictorial data by the first access to netwoks authentication website to visual reception server.
In above-mentioned image quality authentication method, described step b2) may further comprise the steps: b21) input customer identification number, password and out of Memory; B22) whether the checking input information is correct; B23) if verify incorrectly,, re-enter or withdraw from visual sender display enrollment page; B24) preserve user profile, return and succeed in registration.
In above-mentioned image quality authentication method, at described step b2) afterwards, also comprise step b3) whether the account number of examination customer identification number correspondence have the enough amount of money, if any the enough amount of money, therefrom deducts certain fund, permits visual transmit leg to send certified image; Not enough as the amount of money, then send the information of insufficient in amount to visual transmit leg.
In above-mentioned image quality authentication method, also comprise step I) if visual transmit leg receive from the qualified information of the pictorial data of authentication website; Then form and print the receipt that comprises following information: 1) image sign; 2) image; 3) accept data.
In above-mentioned image quality authentication method, described transmission means by safety transfers to the database with another network of first Network Isolation, may further comprise the steps: the database server of the authentication website on first network of connection will import backup server from the pictorial data of visual transmit leg by certain mode; Disconnect the physical connection of database server and backup server on first network by time-delay relay; Connect being connected of backup server and database server on described another network by time-delay relay; With the data importing on the backup server to the database that is connected described another network; By the physical connection between database server and the backup server on described another network of time-delay relay disconnection.
In above-mentioned image quality authentication method, whether it meets the requirements described authentication website to the digitized picture data judging uploaded, may further comprise the steps: size detection, definition detect, angle detects, decorate and detect and color detection.
In above-mentioned image quality authentication method, further comprising the steps of: by the first access to netwoks authentication website, input user ID, password, the number of accepting information retrieval corresponding diagram image data.
In above-mentioned image quality authentication method, further comprising the steps of: as, the certification fee that prestores of the account number under the sign to be used by the payment system on described first network.
In above-mentioned image quality authentication method, further comprising the steps of: by the described first access to netwoks authentication website, input user ID, password, inquiry account balance.
Implement based on network image quality authentication method of the present invention, because the digital camera of the maturation that makes full use of and the interference networks of popularizing, by can realizing following function and characteristics: 1) quality inspection: on basis quasi real time by the authentication center of Internet visit, the quality of the digital photograph that check is put mutually from individual trick, the digital photograph quality of guaranteeing to be used to bid to host Certification of Second Generation meets the accreditation standard.The quality inspection mode can be taked modes such as total man worker's check, automatic gauging and desk checking combine, complete automatic gauging.2) adjust function: can adjust the photo that quality problems are not too serious, the adjustment here also can be taked modes such as total man worker's check, automatic gauging and desk checking combine, complete automatic gauging; 3) for passing through check and satisfactory photo, the point of taking a picture can only be printed a receipt (seeing appendix) to get final product without photograph print, and the photograph people can handle certificate with this receipt decorrelation department.4) data security: the mode of taking Web server and database server to separate, Web server is responsible for outwards providing Web service, do not store any data, the storage of data all is after being placed on Web server, among its database server that couples together by secured fashion (as VPN), and this database server can not directly be visited, and this has just guaranteed the safety of data.5) data security forwarding function: by the multi-level safety measure, guarantee Certification of Second Generation digital photograph data transmission security, guarantee the data security (being the public security net) of the internal network that the another one level of security is very high here.6) be widely used, the user of native system can be the photograph point, also can be the individual, and deduction mode can adopt pre-payment or real-time deduction mode, and pay charge way can be modes such as cash, bank card, mobile phone, information service center.7) extendibility is good, and this is to realize functions such as accepting of certificate and online examination by simple expansion on the net.
Description of drawings
Fig. 1 is the main-process stream schematic diagram of the inventive method embodiment;
Fig. 2 is promptly take a picture a little a register flow path schematic diagram of visual transmit leg among the inventive method embodiment;
Fig. 3 is take a picture among the inventive method embodiment registration of point and the schematic flow sheet of associative operation;
Fig. 4 is that visual recipient is the related procedure schematic diagram of local police station among the inventive method embodiment;
Fig. 5 is a pre-payment schematic flow sheet among the inventive method embodiment;
Fig. 6 is the schematic flow sheet of withholing among the inventive method embodiment;
Fig. 7 is a certificates handling schematic flow sheet when using the inventive method;
Fig. 8 uses the inventive method to carry out the schematic flow sheet that the data inter-network is transmitted;
Fig. 9 is an exemplary sample of using the digital photographing receipt of the inventive method formation;
Figure 10 is that authentication website is carried out schematic flow sheet.
Embodiment
In the system's main-process stream that goes out as shown in Figure 1, comprise the photo making, upload, authentication, receipt, application to get certificate; Accept applications, synthetic, make steps such as certificate.
In the register flow path of photograph point as shown in Figure 2, comprise online, enrollment page is selected also to show in the access registrar website, and input user ID, password etc. check by authentication website whether it correct, if correctly then preserve user profile, prompting is succeeded in registration.Authentication website is carried out flow process shown in Figure 10, comprises the judgement of photo legitimacy, returns as illegal; If legal, generate the photo numbering, carry out software again and detect automatically, as detect defectively, return defective information and give visual transmit leg; If it is qualified to detect automatically, then carry out manual detection, defective as manual detection, return defective information; If manual detection is qualified, then change another network over to.
In the flow process of the registration of the photograph point shown in Fig. 3 and associative operation, comprise that the user registers, operation such as user's login, user information management, authentication result inquiry, receipt printing, photo upload, prepayment are withholdd.Wherein, user information management is used to revise user's register information; The authentication result inquiry is used for inquiring about from authentication website the quality authentication result of the image of having uploaded; Receipt is printed the receipt that is used to print the photo that has approved qualified knot result, and an exemplary receipt sample as shown in Figure 9.
In the local police station's related procedure shown in Fig. 4, local police station need inquire corresponding photo by the access to netwoks authentication website according to the number of accepting on the receipt, changes and accepts flow process.
In the pre-payment schematic flow sheet shown in Fig. 5, visual transmit leg, the point of for example taking a picture can arrive the pre-payment toll site of appointment and pay dues, and also can also be undertaken by the mode of Web bank's card or the payment of other payment system.
In the flow process of withholing shown in Fig. 6, look into remaining sum earlier, remaining sum is not enough, provides prompting, when remaining sum is enough, withholds, and also can adopt real-time deduction mode, or is undertaken by modes such as bank card, mobile phone, information service centers.
When the application the inventive method shown in Fig. 7, in the certificates handling flow process, comprise photograph, upload, receipt, fill data, the neck card, process is succinct, and efficient is higher.
In the flow process that the pictorial data inter-network shown in Fig. 8 is transmitted, comprise the following step that can finish automatically: the database server that 1) is connected the authentication website on the Internet will import backup server from the pictorial data of visual transmit leg by certain mode; Physical connection by database server and backup server on the time-delay relay disconnection Internet; Connect being connected of backup server and database server on the another one in-house network by time-delay relay; With the data importing on the backup server to the database that is connected the another one in-house network; By the physical connection between database server and the backup server on the time-delay relay disconnection another one in-house network.
In the system that implements the inventive method, following fault handling method is arranged: 1) Internet is disconnected: the point of taking a picture just can not connect authentication center by Internet, ISDN taken a picture, and (these points of taking a picture have been installed ISDN to not influence of point, and by ISDN can dial-in direct to authentication center's net of handling official business, therefore direct access registrar center, and do not need to visit by Internet, this can realize by carry out certain being provided with in router), so network interrupts only influential to Internet photograph point: they can not upload pictures arrive authentication center, can learn photo by irradiation, perhaps digital photograph is kept on the hard disk, print an interim receipt to camerist, upload after normal Deng Internet, this does not just need camerist arrive the photograph point once more, still can not accomplish real-time authentication again; 2) authentication center's in-house network is disconnected: interrupt if authentication center's in-house network connects, the point of then taking a picture just can not upload pictures arrive authentication center, the testing staff of authentication center can not carry out the authentication of photo, the point of taking a picture can be learned photo by irradiation, perhaps digital photograph is kept on the hard disk, upload authentication Deng authentication center's in-house network again after normal, but can not accomplish real-time authentication; 3) the public security net is disconnected: the multi-stage data storehouse: because verification process and public security net are irrelevant, therefore can accomplish real-time authentication, accept in advance: the policeman of local police station receives certificates handling person's request in advance, checks photo, text information in certificates handling person's database, data download and audit once more after network has led to; 4) one-level database: because verification process and public security net are irrelevant, therefore can accomplish real-time authentication, but, can not check the authenticity and the accuracy of data, therefore can not accept because can not access certificates handling person's photo and text information.5) some local police station does not connect upward public security net; Do not have the local police station that connects for the public security net, can accept text, examine for the first time by modes such as the residence booklet bound copies of a document kept on file in local police station; The policeman of local police station delivers to accreditation center to image and text information by modes such as hard disk, floppy disk, USB flash disks then; At accreditation center's composograph and text information, make certificate then; Provide by local police station Deng the back of coming to testify, when providing, finally veritify.Authentication center has a power failure (having 12 hours UPS), as long as interruption duration is no more than 12 hours, and not influence, otherwise handle with quadrat method with authentication center's in-house network is disconnected.
By one embodiment of the present of invention being applied to China second-generation identity card image acquisition and authentication, can obtain following effect: 1) guarantee the accreditation quality: because Certification of Second Generation making logarithmic code photo quality requirement is very high, and the photograph personnel are untrained, are difficult to hold the photo quality.Digital photo passes to authentication center, checks through the professional, and adjustable defective photo is carried out the quality adjustment.Can guarantee that photo meets the Certification of Second Generation quality standard.And can pass through the authentication center website, the point of taking a picture is taken a picture carry out the technological guidance.2) make things convenient for the people: the application to get people knows promptly in two minutes whether photo is qualified after the point of taking a picture is taken a picture; As defective, then and there can be heavily according to, significantly reduce the masses because the defective inconvenience that brings to the masses of photo.For the photograph point, owing to adopt authentication center's pattern, do not need photograph print, per person saves nearly 1 yuan of printing expense.3) accreditation efficient is accepted in raising: adopt authentication center, standard compliant digital photograph directly reaches the public security grid database, and the person of accepting can be carried out text and photo quickly and easily and be articulated.Authentication center is owing to adopt professional safety measure, and disconnects with public security net physics, can guarantee fully that the public security netting index is according to safety; If adopt other digital photograph transmission means (as floppy disk, CD etc.), then can not guarantee the safety of public security net.4) alleviate the operating pressure of local police station: at the Certification of Second Generation change certification initial stage, application to get is concentrated, if adopt optical photograph, the person of accepting will be scanned optical photograph, photo of every scanning is spent 3 minutes time approximately, has lowered the speed of accepting greatly, is accepting the peak period, the application to get masses are waited for a long time, and adopt optical photograph scanning, can not guarantee photographic quality, if detect defective after photo is accepted, bring again for the application to get masses and take a picture Shen Ling inconvenience again.The scanning of employing optical photograph, 109 local police stations in the city are equipped with 109 scanners at least, and by 2000 yuan/platform, amounting to needs 21.8 ten thousand yuan.Not only equipment investment is big, and maintenance cost is also big.5) guarantee public security net safety: not by mode data transmissions such as CD, floppy disk, hard disk, USB flash disks, guarantee the physical isolation of public security net and other network, finally guaranteed the safety of public security net.

Claims (13)

1, a kind of based on network image quality authentication method is characterized in that, a) makes digitized image file; B) visual transmit leg uploads to authentication website by first network with the digitized image file of making; C) whether it meets the requirements authentication website to the digitized picture data judging uploaded; D) if pictorial data is qualified the transmission means of described digital map image data by safety transferred to the database of another network of first Network Isolation and by network send with the related number of the accepting data of qualified pictorial data to described visual transmit leg; E) if pictorial data is defective defective information is sent to visual transmit leg.
2, according to the described image quality authentication method of claim 1, it is characterized in that, after described step c), also comprise step (f): the photo that quality problems are not serious is simply adjusted.
3, according to the described image quality authentication method of claim 1, it is characterized in that, also comprise step (g): statistics is from the image quality situation of each described visual transmit leg.
4, according to the described image quality authentication method of claim 3, it is characterized in that, also comprise step (h),, send the message that its transmission image was reminded or forbidden to quality counting the relatively poor described visual transmit leg of image quality.
5, according to the described image quality authentication method of claim 1, it is characterized in that, at b) before the step, further comprising the steps of: as b1) to make the computer of visual transmit leg connect the above first network; B2) undertaken about permitting it to transmit the application for registration of pictorial data by the first access to netwoks authentication website to visual reception server.
6, according to the described image quality authentication method of claim 5, it is characterized in that described step b2) may further comprise the steps: b21) input customer identification number, password and out of Memory; B22) whether the checking input information is correct; B23) if verify incorrectly,, re-enter or withdraw from visual sender display enrollment page; B24) preserve user profile, return and succeed in registration.
7, according to the described image quality authentication method of claim 5, it is characterized in that, at described step b2) afterwards, also comprise step b3) whether the account number of examination customer identification number correspondence have the enough amount of money, if any the enough amount of money, therefrom deduct certain fund, permit visual transmit leg to send certified image; Not enough as the amount of money, then send the information of insufficient in amount to visual transmit leg.
8, according to the described image quality authentication method of claim 5, it is characterized in that, also comprise step I) if visual transmit leg receive from the qualified information of the pictorial data of authentication website; Then form and print the receipt that comprises following information: 1) image sign; 2) image; 3) accept data.
9, according to the described image quality authentication method of claim 1, it is characterized in that, described transmission means by safety transfers to the database with another network of first Network Isolation, may further comprise the steps: the database server of the authentication website on first network of connection will import backup server from the pictorial data of visual transmit leg by certain mode; Disconnect the physical connection of database server and backup server on first network by time-delay relay; Connect being connected of backup server and database server on described another network by time-delay relay; With the data importing on the backup server to the database that is connected described another network; By the physical connection between database server and the backup server on described another network of time-delay relay disconnection.
10, according to the described image quality authentication method of claim 1, it is characterized in that, whether it meets the requirements described authentication website to the digitized picture data judging uploaded, may further comprise the steps: size detection, definition detect, angle detects, decorate and detect and color detection.
11, according to any one described image quality authentication method among the claim 1-10, it is characterized in that, further comprising the steps of: by the first access to netwoks authentication website, input user ID, password, the number of accepting information retrieval corresponding diagram image data.
12, according to the described image quality authentication method of claim 7, it is characterized in that, further comprising the steps of: as, the certification fee that prestores of the account number under the sign to be used by the payment system on described first network.
13, according to the described image quality authentication method of claim 12, it is characterized in that, further comprising the steps of: by the described first access to netwoks authentication website, input user ID, password, inquiry account balance.
CN200410015214A 2004-01-16 2004-01-16 Network based image quality identification method Expired - Lifetime CN100589391C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200410015214A CN100589391C (en) 2004-01-16 2004-01-16 Network based image quality identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200410015214A CN100589391C (en) 2004-01-16 2004-01-16 Network based image quality identification method

Publications (2)

Publication Number Publication Date
CN1558597A true CN1558597A (en) 2004-12-29
CN100589391C CN100589391C (en) 2010-02-10

Family

ID=34351365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200410015214A Expired - Lifetime CN100589391C (en) 2004-01-16 2004-01-16 Network based image quality identification method

Country Status (1)

Country Link
CN (1) CN100589391C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133207A (en) * 2017-11-24 2018-06-08 阿里巴巴集团控股有限公司 The image of auxiliary items closes the method, apparatus and electronic equipment of rule

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133207A (en) * 2017-11-24 2018-06-08 阿里巴巴集团控股有限公司 The image of auxiliary items closes the method, apparatus and electronic equipment of rule

Also Published As

Publication number Publication date
CN100589391C (en) 2010-02-10

Similar Documents

Publication Publication Date Title
AU2005328387B2 (en) System and method for network-based object authentication
US5790674A (en) System and method of providing system integrity and positive audit capabilities to a positive identification system
US20050273627A1 (en) Biometrics in issuance of government documents
CN108376329A (en) One kind moving quick ruling workflow based on network arbitration formula
RU2419154C2 (en) Method and system to remotely identify and verify customer identity when rendering financial services
CN105407042A (en) Remote SIM card accessing method and system based on wechat public platform
CN103248483B (en) A kind of real name verification device
CN105827612B (en) Salary payment system based on mobile internet service application
CN107784750A (en) A kind of loan done by oneself machine terminal management system and method
CN108510274A (en) It is a kind of can visual identity image and Quick Response Code combine the method, apparatus of verification
CN105704219A (en) Local forum website user registering method and system based on locations
CN113128950A (en) Enterprise chain code service platform
CN111222770A (en) One-stop processing method and system for entry and exit services
CN110378886A (en) Image comparison method, image comparison device, electronic equipment and medium
CN100589391C (en) Network based image quality identification method
CN115050487B (en) Internet medical service management system based on artificial intelligence
US20220270423A1 (en) Identity-based enablement of event access control
CN115204860A (en) Self-service payment system based on unified payment platform
KR101429929B1 (en) Biometric and demographic data transfer and management system and apparatus
CN108876367B (en) Identity authentication method and device based on virtual number
JP2002374401A (en) Method, device and program for issuing certificate, medium where the program is recorded, method, device and program for issuing certificate, and medium where the program is recorded
CN115018491A (en) Artwork digital copyright registration transaction system and method based on block chain technology
KR20010025728A (en) An Integrated Apparatus for Issuing Various Certificates by Self-Service
US20100034431A1 (en) Signer-implemented method and system using biometric marks for avoiding fraudulent checks and documents

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: INTERNATIONAL SECURITY TECHNOLOGY CO., LTD. HUAZHE

Free format text: FORMER OWNER: INTERNATIONAL SECURITY TECHNOLOGY CO., LTD. HUAZHENGLIAN INDUSTRY CO., LTD., SHENZHEN CITY

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20100927

Address after: Futian District, Shenzhen city of Guangdong Province, 518049 Village Road No. 99

Co-patentee after: INTERNATIONAL SECURITY TECHNOLOGY Ltd.

Patentee after: SHENZHEN SPECIAL CERTIFICATE R

Co-patentee after: SHENZHEN HUAZHENGLIAN INDUSTRIAL Co.,Ltd.

Co-patentee after: INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) Ltd.

Co-patentee after: IST INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) Ltd.

Address before: Futian District, Shenzhen city of Guangdong Province, 518049 Village Road No. 99

Co-patentee before: INTERNATIONAL SECURITY TECHNOLOGY Ltd.

Patentee before: SHENZHEN SPECIAL CERTIFICATE R

Co-patentee before: SHENZHEN HUAZHENGLIAN INDUSTRIAL Co.,Ltd.

ASS Succession or assignment of patent right

Owner name: INTERNATIONAL SECURITY TECHNOLOGY CO., LTD. HUAZHE

Free format text: FORMER OWNER: INTERNATIONAL SECURITY TECHNOLOGY CO., LTD. HUAZHENGLIAN INDUSTRY CO., LTD., SHENZHEN CITY IST INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) CO., LTD. INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) CO., LTD.

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518049 NO.99, MEICUN ROAD, SHANGMEILIN, FUTIAN DISTRICT, SHENZHEN CITY, GUANGDONG PROVINCE TO: 518049 NO.99, MEICUN ROAD, SHANGMEILIN, SHENZHEN CITY

TR01 Transfer of patent right

Effective date of registration: 20101213

Address after: 518049 Shenzhen City Meilin Plum Village Road No. 99

Co-patentee after: INTERNATIONAL SECURITY TECHNOLOGY Ltd.

Patentee after: SHENZHEN SPECIAL CERTIFICATE R

Co-patentee after: SHENZHEN HUAZHENGLIAN INDUSTRIAL Co.,Ltd.

Address before: Futian District, Shenzhen city of Guangdong Province, 518049 Village Road No. 99

Co-patentee before: INTERNATIONAL SECURITY TECHNOLOGY Ltd.

Patentee before: SHENZHEN SPECIAL CERTIFICATE R

Co-patentee before: SHENZHEN HUAZHENGLIAN INDUSTRIAL Co.,Ltd.

Co-patentee before: INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) Ltd.

Co-patentee before: IST INTERNATIONAL SECURITY TECHNOLOGY (SHENZHEN) Ltd.

CX01 Expiry of patent term

Granted publication date: 20100210

CX01 Expiry of patent term